认知无线电                        
                
                                
                        
                            吞吐量                        
                
                                
                        
                            计算机科学                        
                
                                
                        
                            计算机网络                        
                
                                
                        
                            级联样式表                        
                
                                
                        
                            干扰(通信)                        
                
                                
                        
                            利用                        
                
                                
                        
                            声誉                        
                
                                
                        
                            最优化问题                        
                
                                
                        
                            最大化                        
                
                                
                        
                            计算机安全                        
                
                                
                        
                            数学优化                        
                
                                
                        
                            无线                        
                
                                
                        
                            频道(广播)                        
                
                                
                        
                            算法                        
                
                                
                        
                            电信                        
                
                                
                        
                            社会科学                        
                
                                
                        
                            数学                        
                
                                
                        
                            网页                        
                
                                
                        
                            社会学                        
                
                                
                        
                            万维网                        
                
                        
                    
            作者
            
                Zhenyu Xu,Zhiguo Sun,Lili Guo            
         
                    
            出处
            
                                    期刊:IEEE Transactions on Vehicular Technology
                                                         [Institute of Electrical and Electronics Engineers]
                                                        日期:2021-07-08
                                                        卷期号:70 (8): 8378-8383
                                                        被引量:15
                                
         
        
    
            
            标识
            
                                    DOI:10.1109/tvt.2021.3095541
                                    
                                
                                 
         
        
                
            摘要
            
            In cognitive radio networks (CRNs), secondary users (SUs) can opportunistically access the licensed bands through spectrum sensing while primary users (PUs) are inactive. While collaborative spectrum sensing (CSS) exploits the benefits of cooperation, the spectrum sensing data falsification (SSDF) attackers are subsequently introduced, which aim at undermining the performance of CRNs. We thus are motivated to maximize the throughput of the CRNs under SSDF attacks. First, to better discern SSDF attackers, we designate a double reputation based algorithm to differentiate the SSDF attackers and honest secondary users (HSUs). Then the trade off problem is formulated to find the optimal network parameters including, sensing duration, global decision threshold, energy detection threshold, reputation thresholds for maximizing the throughput of the secondary users network (SUN) subject to limited interference with the PUs. To address the non-convexity of the optimization problem, dummy variables are introduced and the alternative optimization method is adopted. Numerical results show that the proposed algorithm is effective in increasing throughput of the SUN with sufficient protection to the PUs.
         
            
 
                 
                
                    
                    科研通智能强力驱动
Strongly Powered by AbleSci AI